Sciweavers

521 search results - page 87 / 105
» Scalable Secure Multiparty Computation
Sort
View
ICDCSW
2003
IEEE
14 years 1 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
AGENTS
2001
Springer
14 years 12 days ago
Argumentation as distributed constraint satisfaction: applications and results
Conflict resolution is a critical problem in distributed and collaborative multi-agent systems. Negotiation via argumentation (NVA), where agents provide explicit arguments or ju...
Hyuckchul Jung, Milind Tambe, Shriniwas Kulkarni
ICDCS
2010
IEEE
13 years 11 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
WIOPT
2010
IEEE
13 years 5 months ago
Saluki: A high-performance Wi-Fi sniffing program
Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sni...
Keren Tan, David Kotz
WEBI
2009
Springer
14 years 2 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li